Bad Characters: Imperceptible NLP Attacks
☆36Apr 9, 2024Updated 2 years ago
Alternatives and similar repositories for imperceptible
Users that are interested in imperceptible are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- ☆31Oct 14, 2021Updated 4 years ago
- ☆19Mar 9, 2024Updated 2 years ago
- Fastened CROWN: Tightened Neural Network Robustness Certificates☆10Feb 10, 2020Updated 6 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Jun 29, 2025Updated 10 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- From Hero to Zéroe: A Benchmark of Low-Level Adversarial Attacks☆15Feb 23, 2023Updated 3 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆23Sep 8, 2021Updated 4 years ago
- Official PyTorch implementation of "Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian O…☆26Sep 26, 2023Updated 2 years ago
- TorchONNX is a tool to convert an ONNX model to a pytorch model.☆29Feb 13, 2026Updated 2 months ago
- [EMNLP'22] Textual Manifold-based Defense Against Natural Language Adversarial Examples☆11Apr 6, 2023Updated 3 years ago
- Code for "Imitation Attacks and Defenses for Black-box Machine Translations Systems"☆32May 1, 2020Updated 6 years ago
- End-to-end codebase for finetuning LLMs (LLaMA 2, 3, etc.) with or without DP☆17Sep 23, 2024Updated last year
- Hidden backdoor attack on NLP systems☆46Nov 14, 2021Updated 4 years ago
- Benchmarks for the VNN Comp 2023☆16Jun 7, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The official repo for GCP-CROWN paper☆13Sep 26, 2022Updated 3 years ago
- [NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zh…☆21Oct 1, 2022Updated 3 years ago
- TrojanLM: Trojaning Language Models for Fun and Profit☆16Jun 17, 2021Updated 4 years ago
- ☆25Nov 21, 2020Updated 5 years ago
- The repo is a source code for the project on Adversarial examples on Semantic Segmentation Networks☆13Sep 12, 2021Updated 4 years ago
- Robust Audio Adversarial Example for a Physical Attack☆62Nov 13, 2019Updated 6 years ago
- ☆29Sep 15, 2024Updated last year
- Codebase for Obfuscated Activations Bypass LLM Latent-Space Defenses☆31Feb 11, 2025Updated last year
- SlimONNX is a tool to simplify or optimize an ONNX model.☆30Feb 13, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- ☆57Oct 4, 2024Updated last year
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆40Jul 8, 2024Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆55Jun 2, 2025Updated 11 months ago
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆23Oct 30, 2023Updated 2 years ago
- Automatically generates schema given json samples.☆10Jun 1, 2016Updated 9 years ago
- A regular expression to SMT-LIB constraint translator☆12Jul 12, 2025Updated 9 months ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks☆13Feb 26, 2023Updated 3 years ago
- ☆10Jun 5, 2021Updated 4 years ago
- template for https://cnli.me☆10Feb 27, 2025Updated last year
- Mine conversations from novels in Project Gutenberg, to generate data for data-driven dialogue systems.☆15May 7, 2019Updated 7 years ago
- Codes for reproducing the experimental results in "CNN-Cert: An Efficient Framework for Certifying Robustness of Convolutional Neural Net …☆28Jun 23, 2021Updated 4 years ago
- ☆11May 13, 2018Updated 7 years ago
- ☆25May 6, 2021Updated 5 years ago